A year ago, i could get scammed on any device, any browser, from my home network. Now this has become quite challenging. Which: yay! boo!
It's great that there are more protections from malicious traffic distribution systems (TDS) but it makes me work for my research. lol.
Part of this change is a mystery to me. Maybe you have an idea?
There's interference happening at the network level in the ISP. Now, regardless of the browser or the device, i'll get an SSL protocol error -- so i'm just dead in the water.
At first i thought it was a DNS RPZ, but the DNS is passing through fine. The mucking is happening on the connection.
i've even had a few cases where i was able to get the scam content and then less than a minute later, on the same browser, it was blocked. and then the system remembers - that domain is dead for me afterwards.
I can still use a res proxy or go to a local cafe on the same device and get content. so yeah, it's my ISP. and a colleague reported the same in South America. so a network security appliance, i think. .Zscaler?
if you have thoughts, feel free to privately respond. bad guys watch my linkedin, so i'm sure they found my mastodon too. i'm sure they find my political posts riveting .maybe i should post more knitting.